diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28722.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28722.json index c81fbb8a098..472ae5907ef 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28722.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28722.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28722", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:09.107", - "lastModified": "2024-01-19T20:15:09.107", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json index 703416fe5b8..661a9a1b5fb 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28738", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:09.397", - "lastModified": "2024-01-19T20:15:09.397", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28743.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28743.json index 3a7b176592f..84c9b7d2d9c 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28743.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28743.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28743", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:09.590", - "lastModified": "2024-01-19T20:15:09.590", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29244.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29244.json index 0cfcf185fa2..56f20757083 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29244.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29244.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29244", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:09.777", - "lastModified": "2024-01-19T20:15:09.777", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29495.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29495.json index 983cebe9646..9f0c043242c 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29495.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29495.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29495", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:09.987", - "lastModified": "2024-01-19T20:15:09.987", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32272.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32272.json index 97dc3f83284..0c7db8194b8 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32272.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32272.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32272", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:10.177", - "lastModified": "2024-01-19T20:15:10.177", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32544.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32544.json index cab155078c3..8bc87f8051d 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32544.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32544.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32544", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:10.363", - "lastModified": "2024-01-19T20:15:10.363", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33295.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33295.json index c335ab5d3ef..bdf0fed1bc6 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33295.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33295.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33295", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T20:15:10.567", - "lastModified": "2024-01-19T20:15:10.567", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38541.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38541.json index c9c24e8556a..a4f6e06810b 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38541.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38541.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38541", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:10.627", - "lastModified": "2024-01-19T20:15:10.627", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38587.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38587.json index 8be90f15a0d..996a5e6cf93 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38587.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38587.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38587", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:10.813", - "lastModified": "2024-01-19T20:15:10.813", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42429.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42429.json index 9fd8c61df26..f74fdacb4d9 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42429.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42429.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42429", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:11.343", - "lastModified": "2024-01-19T20:15:11.343", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42766.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42766.json index 930fbfc23fb..e07ec87c7ea 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42766.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42766.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42766", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:11.537", - "lastModified": "2024-01-19T20:15:11.537", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47035.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47035.json index aefb42ce701..20c40976ed0 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47035.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47035.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47035", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T20:15:11.820", - "lastModified": "2024-01-19T20:15:11.820", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49329.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49329.json new file mode 100644 index 00000000000..a08db464876 --- /dev/null +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49329.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-49329", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-19T21:15:08.320", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Anomali Match before 4.6.2 allows OS Command Injection. An authenticated admin user can inject and execute operating system commands. This arises from improper handling of untrusted input, enabling an attacker to elevate privileges, execute system commands, and potentially compromise the underlying operating system. The fixed versions are 4.4.5, 4.5.4, and 4.6.2. The earliest affected version is 4.3." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.anomali.com/collaborate/ciso-blog", + "source": "cve@mitre.org" + }, + { + "url": "https://www.anomali.com/security-advisory/anml-2023-01", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json index ee9ff4f7d87..6a45dfb1826 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50447.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50447", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T20:15:11.870", - "lastModified": "2024-01-19T20:15:11.870", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50693.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50693.json index e05911439e0..cee3ba78709 100644 --- a/CVE-2023/CVE-2023-506xx/CVE-2023-50693.json +++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50693.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50693", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T20:15:11.917", - "lastModified": "2024-01-19T20:15:11.917", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50694.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50694.json index 38c309c6e2c..2c7113d12cf 100644 --- a/CVE-2023/CVE-2023-506xx/CVE-2023-50694.json +++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50694.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50694", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T20:15:11.967", - "lastModified": "2024-01-19T20:15:11.967", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json index a43982df3a1..6852b85ceca 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5080", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.017", - "lastModified": "2024-01-19T20:15:12.017", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json index 67c2f1d5038..b4978fd20d9 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5081", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.230", - "lastModified": "2024-01-19T20:15:12.230", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json index e18d4679a02..adfb5701d8c 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5981", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-28T12:15:07.040", - "lastModified": "2024-01-10T21:15:09.230", + "lastModified": "2024-01-19T21:15:08.400", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/01/19/3", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:0155", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6043.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6043.json index 8bad4461897..b30199372e2 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6043.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6043.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6043", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.433", - "lastModified": "2024-01-19T20:15:12.433", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6044.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6044.json index b3cabe63116..bcbea437d15 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6044.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6044.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6044", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.647", - "lastModified": "2024-01-19T20:15:12.647", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json index 1adb7b11c0f..d72a642fa53 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6450", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.853", - "lastModified": "2024-01-19T20:15:12.853", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json index 4aaeefb16a2..e9d9d8a7671 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0553", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T12:15:45.557", - "lastModified": "2024-01-16T13:56:05.467", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T21:15:08.527", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/01/19/3", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0553", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json index 3b480eb8b3f..8ba85da7809 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0567", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T14:15:48.527", - "lastModified": "2024-01-16T23:12:38.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T21:15:08.613", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/01/19/3", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0567", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0728.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0728.json index f95e802b501..0f6fb4f6700 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0728.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0728", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T19:15:08.413", - "lastModified": "2024-01-19T19:15:08.413", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0729.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0729.json index 59897219bd6..7637bcb9703 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0729.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0729", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T19:15:08.647", - "lastModified": "2024-01-19T19:15:08.647", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0730.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0730.json index 3c9925208af..0702a398d74 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0730.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0730", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T19:15:08.857", - "lastModified": "2024-01-19T19:15:08.857", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0731.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0731.json index bf5c7b61bf2..ea0b277f257 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0731.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0731", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T20:15:13.120", - "lastModified": "2024-01-19T20:15:13.120", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0732.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0732.json index 777d08202ca..b0fd48ab562 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0732.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0732", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T20:15:13.353", - "lastModified": "2024-01-19T20:15:13.353", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0733.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0733.json new file mode 100644 index 00000000000..4abc0d4678a --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0733.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0733", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-19T21:15:08.703", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Smsot up to 2.12. It has been classified as critical. Affected is an unknown function of the file /api.php of the component HTTP POST Request Handler. The manipulation of the argument data[sign] leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251556." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://note.zhaoj.in/share/3GznRo9vWRJ8", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251556", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251556", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0734.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0734.json new file mode 100644 index 00000000000..280442425ca --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0734.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0734", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-19T21:15:08.923", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Smsot up to 2.12. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /get.php. The manipulation of the argument tid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251557 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://note.zhaoj.in/share/vo1KOw3EYmBK", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251557", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251557", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0735.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0735.json new file mode 100644 index 00000000000..7d0941c0be7 --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0735.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0735", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-19T21:15:09.143", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. Affected by this issue is the function exec of the file admin/operations/expense.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251558 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://blog.csdn.net/DMZNX/article/details/135683738", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251558", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251558", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0736.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0736.json new file mode 100644 index 00000000000..aac09a9da3b --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0736.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0736", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-19T21:15:09.370", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in EFS Easy File Sharing FTP 3.6. This affects an unknown part of the component Login. The manipulation of the argument password leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251559." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://0day.today/exploit/39249", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251559", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251559", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0737.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0737.json new file mode 100644 index 00000000000..42ed4fd4e6e --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0737.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0737", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-19T22:15:07.770", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Xlightftpd Xlight FTP Server 1.1. This vulnerability affects unknown code of the component Login. The manipulation of the argument user leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251560." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251560", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251560", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0738.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0738.json new file mode 100644 index 00000000000..5cdc571fb3a --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0738.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0738", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-19T22:15:07.997", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in ???? mldong 1.0. This issue affects the function ExpressionEngine of the file com/mldong/modules/wf/engine/model/DecisionModel.java. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251561 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/biantaibao/mldong_RCE/blob/main/RCE.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251561", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251561", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0739.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0739.json new file mode 100644 index 00000000000..4443af36b86 --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0739.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0739", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-19T22:15:08.217", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Hecheng Leadshop up to 1.4.20. Affected is an unknown function of the file /web/leadshop.php. The manipulation of the argument install leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-251562 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://note.zhaoj.in/share/vLswXhWxUrs8", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.251562", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.251562", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0758.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0758.json new file mode 100644 index 00000000000..03cf992ee1c --- /dev/null +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0758.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-0758", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:09.600", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "MolecularFaces before 0.3.0 is vulnerable to cross site scripting. A remote attacker can execute arbitrary JavaScript in the context of a victim browser via crafted molfiles.\n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/advisories/GHSA-2pwh-52h7-7j84", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ipb-halle/MolecularFaces/security/advisories/GHSA-2pwh-52h7-7j84", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-2pwh-52h7-7j84", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21596.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21596.json index 0454218afdb..f9c128f84c0 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21596.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21596", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:47.267", - "lastModified": "2024-01-12T13:47:31.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T22:58:28.350", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -50,14 +80,962 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.1:-:*:*:*:*:*:*", + "matchCriteriaId": "A6B764F3-EE2A-4CA1-8A7E-ED1D86037B8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "0038F142-6F5E-476D-A1EC-E977FD30F155" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "10F9C2B1-BD81-4EDC-ADF5-4B0F39001C7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "61F649B0-0121-4760-9432-5F57214EFC2B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.1:-:*:*:*:*:*:*", + "matchCriteriaId": "57477D7B-F7BB-4491-B545-C770B1160F01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "82A4E4C8-2D50-4675-8A96-8C9DADCE46CF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA75735", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21597.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21597.json index 82b02c35c40..99add3ab78c 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21597.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21597", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:47.460", - "lastModified": "2024-01-12T13:47:31.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T21:04:30.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -50,14 +80,357 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA75738", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21600.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21600.json index 4e67faceeca..ca5ede51181 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21600.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21600", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:47.857", - "lastModified": "2024-01-12T13:47:31.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T22:57:21.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -50,14 +80,442 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", + "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA75741", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21601.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21601.json index e3a14c260a3..2384ba25405 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21601.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21601", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:48.043", - "lastModified": "2024-01-12T13:47:31.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T22:57:04.600", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -50,14 +80,412 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA75742", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21602.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21602.json index 874b42a1e47..37c54588a53 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21602.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21602", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:48.270", - "lastModified": "2024-01-12T13:47:31.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T22:55:48.297", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -50,14 +80,222 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "9DB01252-2F11-41DB-9023-C74FD723334E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "4C9C133A-6114-495F-872C-BD1200953131" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA75743", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21603.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21603.json index 69de8ac5240..3a2309679aa 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21603.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21603", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:48.467", - "lastModified": "2024-01-12T13:47:31.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T22:56:11.320", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -50,14 +80,402 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA75744", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21604.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21604.json index 7ad814bf781..5ec63bef001 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21604.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21604", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:48.677", - "lastModified": "2024-01-12T13:47:31.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T22:56:35.733", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, { "source": "sirt@juniper.net", "type": "Secondary", @@ -50,14 +80,312 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "6D5DC04F-18DE-403B-BE93-2251F3332C1C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA75745", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21643.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21643.json index 508617547be..6a4fa39a439 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21643.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21643", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-10T05:15:09.050", - "lastModified": "2024-01-10T13:56:12.537", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-19T22:53:31.730", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,22 +70,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:identitymodel_extensions:*:*:*:*:*:.net:*:*", + "versionEndExcluding": "6.34.0", + "matchCriteriaId": "3AB172A8-AC83-4C09-A2B4-D4CB9FE422ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:identitymodel_extensions:*:*:*:*:*:.net:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.1.2", + "matchCriteriaId": "6639E6E6-65F1-4757-A7DB-B61EC5978C58" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/releases/tag/6.34.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/releases/tag/7.1.2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/security/advisories/GHSA-rv9j-c866-gp5h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/wiki/jkucve", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22211.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22211.json index 93ecc6aee5a..d88f30f82d9 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22211.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22211", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-19T20:15:13.573", - "lastModified": "2024-01-19T20:15:13.573", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22420.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22420.json new file mode 100644 index 00000000000..25eb45cdca4 --- /dev/null +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22420.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22420", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-01-19T21:15:09.667", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users unable to upgrade should disable the table of contents extension." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jupyterlab/jupyterlab/commit/e1b3aabab603878e46add445a3114e838411d2df", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4m77-cmpx-vjc4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22421.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22421.json new file mode 100644 index 00000000000..0b87afbb4de --- /dev/null +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22421.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-22421", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-01-19T21:15:09.870", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23329.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23329.json index 83ef424edc4..3134330746c 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23329.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23329.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23329", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-19T20:15:13.827", - "lastModified": "2024-01-19T20:15:13.827", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23331.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23331.json index 2639eb533b0..d59faa24499 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23331.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23331.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23331", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-19T20:15:14.070", - "lastModified": "2024-01-19T20:15:14.070", - "vulnStatus": "Received", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23679.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23679.json new file mode 100644 index 00000000000..bde2c92a7c4 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23679.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23679", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.073", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Enonic XP versions less than 7.7.4 are vulnerable to a session fixation issue. An remote and unauthenticated attacker can use prior sessions due to the lack of invalidating session attributes.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/advisories/GHSA-4m5p-5w5w-3jcf", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/enonic/xp/commit/0189975691e9e6407a9fee87006f730e84f734ff", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/enonic/xp/commit/1f44674eb9ab3fbab7103e8d08067846e88bace4", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/enonic/xp/commit/2abac31cec8679074debc4f1fb69c25930e40842", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/enonic/xp/issues/9253", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/enonic/xp/security/advisories/GHSA-4m5p-5w5w-3jcf", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-4m5p-5w5w-3jcf", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23680.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23680.json new file mode 100644 index 00000000000..570595edea7 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23680.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-23680", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.140", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "AWS Encryption SDK for Java versions 2.0.0 to 2.2.0 and less than 1.9.0 incorrectly validates some invalid ECDSA signatures. \n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/advisories/GHSA-55xh-53m6-936r", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-55xh-53m6-936r", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23681.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23681.json new file mode 100644 index 00000000000..1e67022c5f7 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23681.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-23681", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.207", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Artemis Java Test Sandbox versions before 1.11.2 are vulnerable to a sandbox escape when an attacker loads untrusted libraries using System.load or System.loadLibrary. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.\n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/advisories/GHSA-98hq-4wmw-98w9", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-98hq-4wmw-98w9", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23682.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23682.json new file mode 100644 index 00000000000..78100662a9b --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23682.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-23682", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.273", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.\n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-501" + }, + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/advisories/GHSA-227w-wv4j-67h4", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/issues/15", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/releases/tag/1.8.0", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-227w-wv4j-67h4", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23683.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23683.json new file mode 100644 index 00000000000..d2c96f57e70 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23683.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-23683", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.340", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.\n\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/advisories/GHSA-883x-6fch-6wjx", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/releases/tag/1.7.6", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-883x-6fch-6wjx", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23684.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23684.json new file mode 100644 index 00000000000..0a3cc4f5792 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23684.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-23684", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.387", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Inefficient algorithmic complexity in DecodeFromBytes function in com.upokecenter.cbor Java implementation of Concise Binary Object Representation (CBOR) versions 4.0.0 to 4.5.1 allows an attacker to cause a denial of service by passing a maliciously crafted input. Depending on an application's use of this library, this may be a remote attacker.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-407" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/advisories/GHSA-fj2w-wfgv-mwq6", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-fj2w-wfgv-mwq6", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23685.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23685.json new file mode 100644 index 00000000000..f0d7d203a0d --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23685.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-23685", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.470", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Hard-coded credentials in mod-remote-storage versions under 1.7.2 and from 2.0.0 to 2.0.3 allows unauthorized users to gain read access to mod-inventory-storage records including instances, holdings, items, contributor-types, and identifier-types.\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/advisories/GHSA-m8v7-469p-5x89", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/folio-org/mod-remote-storage/commit/57df495f76e9aa5be9ce7ce3a65f89b6dbcbc13b", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/folio-org/mod-remote-storage/security/advisories/GHSA-m8v7-469p-5x89", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-m8v7-469p-5x89", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://wiki.folio.org/x/hbMMBw", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23686.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23686.json new file mode 100644 index 00000000000..56dc02b0a34 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23686.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-23686", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T22:15:08.437", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "DependencyCheck for Maven 9.0.0 to 9.0.6, for CLI version 9.0.0 to 9.0.5, and for Ant versions 9.0.0 to 9.0.5, when used in debug mode, allows an attacker to recover the NVD API Key from a log file.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/advisories/GHSA-qqhq-8r2c-c3f5", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/jeremylong/DependencyCheck/security/advisories/GHSA-qqhq-8r2c-c3f5", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-qqhq-8r2c-c3f5", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23687.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23687.json new file mode 100644 index 00000000000..71293f5a25c --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23687.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-23687", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T22:15:08.517", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Hard-coded credentials in FOLIO mod-data-export-spring versions before 1.5.4 and from 2.0.0 to 2.0.2 allows unauthenticated users to access critical APIs, modify user data, modify configurations including single-sign-on, and manipulate fees/fines.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/advisories/GHSA-vf78-3q9f-92g3", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/folio-org/mod-data-export-spring/commit/93aff4566bff59e30f4121b5a2bda5b0b508a446", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/folio-org/mod-data-export-spring/security/advisories/GHSA-vf78-3q9f-92g3", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-vf78-3q9f-92g3", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://wiki.folio.org/x/hbMMBw", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23688.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23688.json new file mode 100644 index 00000000000..92d79f7731d --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23688.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-23688", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T22:15:08.563", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-323" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/advisories/GHSA-w3hj-wr2q-x83g", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83g", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23689.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23689.json new file mode 100644 index 00000000000..f6996575243 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23689.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-23689", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2024-01-19T21:15:10.520", + "lastModified": "2024-01-19T22:52:48.170", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ClickHouse/clickhouse-java/pull/1334", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/advisories/GHSA-g8ph-74m6-8m7r", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a71d4c2e476..12cde4f2e45 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-19T21:00:24.653691+00:00 +2024-01-19T23:00:24.231726+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-19T20:53:02.350000+00:00 +2024-01-19T22:58:28.350000+00:00 ``` ### Last Data Feed Release @@ -29,69 +29,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -236431 +236453 ``` ### CVEs added in the last Commit -Recently added CVEs: `32` +Recently added CVEs: `22` -* [CVE-2023-33295](CVE-2023/CVE-2023-332xx/CVE-2023-33295.json) (`2024-01-19T20:15:10.567`) -* [CVE-2023-38541](CVE-2023/CVE-2023-385xx/CVE-2023-38541.json) (`2024-01-19T20:15:10.627`) -* [CVE-2023-38587](CVE-2023/CVE-2023-385xx/CVE-2023-38587.json) (`2024-01-19T20:15:10.813`) -* [CVE-2023-42429](CVE-2023/CVE-2023-424xx/CVE-2023-42429.json) (`2024-01-19T20:15:11.343`) -* [CVE-2023-42766](CVE-2023/CVE-2023-427xx/CVE-2023-42766.json) (`2024-01-19T20:15:11.537`) -* [CVE-2023-43956](CVE-2023/CVE-2023-439xx/CVE-2023-43956.json) (`2024-01-19T20:15:11.727`) -* [CVE-2023-45485](CVE-2023/CVE-2023-454xx/CVE-2023-45485.json) (`2024-01-19T20:15:11.770`) -* [CVE-2023-47035](CVE-2023/CVE-2023-470xx/CVE-2023-47035.json) (`2024-01-19T20:15:11.820`) -* [CVE-2023-50447](CVE-2023/CVE-2023-504xx/CVE-2023-50447.json) (`2024-01-19T20:15:11.870`) -* [CVE-2023-50693](CVE-2023/CVE-2023-506xx/CVE-2023-50693.json) (`2024-01-19T20:15:11.917`) -* [CVE-2023-50694](CVE-2023/CVE-2023-506xx/CVE-2023-50694.json) (`2024-01-19T20:15:11.967`) -* [CVE-2023-5080](CVE-2023/CVE-2023-50xx/CVE-2023-5080.json) (`2024-01-19T20:15:12.017`) -* [CVE-2023-5081](CVE-2023/CVE-2023-50xx/CVE-2023-5081.json) (`2024-01-19T20:15:12.230`) -* [CVE-2023-6043](CVE-2023/CVE-2023-60xx/CVE-2023-6043.json) (`2024-01-19T20:15:12.433`) -* [CVE-2023-6044](CVE-2023/CVE-2023-60xx/CVE-2023-6044.json) (`2024-01-19T20:15:12.647`) -* [CVE-2023-6450](CVE-2023/CVE-2023-64xx/CVE-2023-6450.json) (`2024-01-19T20:15:12.853`) -* [CVE-2024-0728](CVE-2024/CVE-2024-07xx/CVE-2024-0728.json) (`2024-01-19T19:15:08.413`) -* [CVE-2024-0729](CVE-2024/CVE-2024-07xx/CVE-2024-0729.json) (`2024-01-19T19:15:08.647`) -* [CVE-2024-0730](CVE-2024/CVE-2024-07xx/CVE-2024-0730.json) (`2024-01-19T19:15:08.857`) -* [CVE-2024-0663](CVE-2024/CVE-2024-06xx/CVE-2024-0663.json) (`2024-01-19T20:15:13.073`) -* [CVE-2024-0731](CVE-2024/CVE-2024-07xx/CVE-2024-0731.json) (`2024-01-19T20:15:13.120`) -* [CVE-2024-0732](CVE-2024/CVE-2024-07xx/CVE-2024-0732.json) (`2024-01-19T20:15:13.353`) -* [CVE-2024-22211](CVE-2024/CVE-2024-222xx/CVE-2024-22211.json) (`2024-01-19T20:15:13.573`) -* [CVE-2024-23329](CVE-2024/CVE-2024-233xx/CVE-2024-23329.json) (`2024-01-19T20:15:13.827`) -* [CVE-2024-23331](CVE-2024/CVE-2024-233xx/CVE-2024-23331.json) (`2024-01-19T20:15:14.070`) +* [CVE-2023-49329](CVE-2023/CVE-2023-493xx/CVE-2023-49329.json) (`2024-01-19T21:15:08.320`) +* [CVE-2024-0733](CVE-2024/CVE-2024-07xx/CVE-2024-0733.json) (`2024-01-19T21:15:08.703`) +* [CVE-2024-0734](CVE-2024/CVE-2024-07xx/CVE-2024-0734.json) (`2024-01-19T21:15:08.923`) +* [CVE-2024-0735](CVE-2024/CVE-2024-07xx/CVE-2024-0735.json) (`2024-01-19T21:15:09.143`) +* [CVE-2024-0736](CVE-2024/CVE-2024-07xx/CVE-2024-0736.json) (`2024-01-19T21:15:09.370`) +* [CVE-2024-0758](CVE-2024/CVE-2024-07xx/CVE-2024-0758.json) (`2024-01-19T21:15:09.600`) +* [CVE-2024-22420](CVE-2024/CVE-2024-224xx/CVE-2024-22420.json) (`2024-01-19T21:15:09.667`) +* [CVE-2024-22421](CVE-2024/CVE-2024-224xx/CVE-2024-22421.json) (`2024-01-19T21:15:09.870`) +* [CVE-2024-23679](CVE-2024/CVE-2024-236xx/CVE-2024-23679.json) (`2024-01-19T21:15:10.073`) +* [CVE-2024-23680](CVE-2024/CVE-2024-236xx/CVE-2024-23680.json) (`2024-01-19T21:15:10.140`) +* [CVE-2024-23681](CVE-2024/CVE-2024-236xx/CVE-2024-23681.json) (`2024-01-19T21:15:10.207`) +* [CVE-2024-23682](CVE-2024/CVE-2024-236xx/CVE-2024-23682.json) (`2024-01-19T21:15:10.273`) +* [CVE-2024-23683](CVE-2024/CVE-2024-236xx/CVE-2024-23683.json) (`2024-01-19T21:15:10.340`) +* [CVE-2024-23684](CVE-2024/CVE-2024-236xx/CVE-2024-23684.json) (`2024-01-19T21:15:10.387`) +* [CVE-2024-23685](CVE-2024/CVE-2024-236xx/CVE-2024-23685.json) (`2024-01-19T21:15:10.470`) +* [CVE-2024-23689](CVE-2024/CVE-2024-236xx/CVE-2024-23689.json) (`2024-01-19T21:15:10.520`) +* [CVE-2024-0737](CVE-2024/CVE-2024-07xx/CVE-2024-0737.json) (`2024-01-19T22:15:07.770`) +* [CVE-2024-0738](CVE-2024/CVE-2024-07xx/CVE-2024-0738.json) (`2024-01-19T22:15:07.997`) +* [CVE-2024-0739](CVE-2024/CVE-2024-07xx/CVE-2024-0739.json) (`2024-01-19T22:15:08.217`) +* [CVE-2024-23686](CVE-2024/CVE-2024-236xx/CVE-2024-23686.json) (`2024-01-19T22:15:08.437`) +* [CVE-2024-23687](CVE-2024/CVE-2024-236xx/CVE-2024-23687.json) (`2024-01-19T22:15:08.517`) +* [CVE-2024-23688](CVE-2024/CVE-2024-236xx/CVE-2024-23688.json) (`2024-01-19T22:15:08.563`) ### CVEs modified in the last Commit -Recently modified CVEs: `70` +Recently modified CVEs: `40` -* [CVE-2023-38908](CVE-2023/CVE-2023-389xx/CVE-2023-38908.json) (`2024-01-19T20:15:11.197`) -* [CVE-2023-38909](CVE-2023/CVE-2023-389xx/CVE-2023-38909.json) (`2024-01-19T20:15:11.273`) -* [CVE-2023-52041](CVE-2023/CVE-2023-520xx/CVE-2023-52041.json) (`2024-01-19T20:39:37.587`) -* [CVE-2023-52042](CVE-2023/CVE-2023-520xx/CVE-2023-52042.json) (`2024-01-19T20:41:35.410`) -* [CVE-2024-22194](CVE-2024/CVE-2024-221xx/CVE-2024-22194.json) (`2024-01-19T19:03:31.737`) -* [CVE-2024-21638](CVE-2024/CVE-2024-216xx/CVE-2024-21638.json) (`2024-01-19T19:03:57.293`) -* [CVE-2024-0530](CVE-2024/CVE-2024-05xx/CVE-2024-0530.json) (`2024-01-19T19:06:33.817`) -* [CVE-2024-0319](CVE-2024/CVE-2024-03xx/CVE-2024-0319.json) (`2024-01-19T19:28:39.993`) -* [CVE-2024-0425](CVE-2024/CVE-2024-04xx/CVE-2024-0425.json) (`2024-01-19T19:28:49.350`) -* [CVE-2024-0571](CVE-2024/CVE-2024-05xx/CVE-2024-0571.json) (`2024-01-19T19:34:35.653`) -* [CVE-2024-0575](CVE-2024/CVE-2024-05xx/CVE-2024-0575.json) (`2024-01-19T19:35:57.170`) -* [CVE-2024-0576](CVE-2024/CVE-2024-05xx/CVE-2024-0576.json) (`2024-01-19T19:38:56.343`) -* [CVE-2024-0577](CVE-2024/CVE-2024-05xx/CVE-2024-0577.json) (`2024-01-19T19:42:36.123`) -* [CVE-2024-0578](CVE-2024/CVE-2024-05xx/CVE-2024-0578.json) (`2024-01-19T19:53:21.670`) -* [CVE-2024-0251](CVE-2024/CVE-2024-02xx/CVE-2024-0251.json) (`2024-01-19T19:55:23.980`) -* [CVE-2024-0572](CVE-2024/CVE-2024-05xx/CVE-2024-0572.json) (`2024-01-19T19:57:57.770`) -* [CVE-2024-22142](CVE-2024/CVE-2024-221xx/CVE-2024-22142.json) (`2024-01-19T19:59:49.717`) -* [CVE-2024-22137](CVE-2024/CVE-2024-221xx/CVE-2024-22137.json) (`2024-01-19T20:02:08.340`) -* [CVE-2024-0579](CVE-2024/CVE-2024-05xx/CVE-2024-0579.json) (`2024-01-19T20:08:29.650`) -* [CVE-2024-0573](CVE-2024/CVE-2024-05xx/CVE-2024-0573.json) (`2024-01-19T20:11:12.927`) -* [CVE-2024-0574](CVE-2024/CVE-2024-05xx/CVE-2024-0574.json) (`2024-01-19T20:14:25.070`) -* [CVE-2024-21613](CVE-2024/CVE-2024-216xx/CVE-2024-21613.json) (`2024-01-19T20:20:24.847`) -* [CVE-2024-21616](CVE-2024/CVE-2024-216xx/CVE-2024-21616.json) (`2024-01-19T20:37:44.537`) -* [CVE-2024-0651](CVE-2024/CVE-2024-06xx/CVE-2024-0651.json) (`2024-01-19T20:49:43.340`) -* [CVE-2024-0652](CVE-2024/CVE-2024-06xx/CVE-2024-0652.json) (`2024-01-19T20:53:02.350`) +* [CVE-2023-50693](CVE-2023/CVE-2023-506xx/CVE-2023-50693.json) (`2024-01-19T22:52:48.170`) +* [CVE-2023-50694](CVE-2023/CVE-2023-506xx/CVE-2023-50694.json) (`2024-01-19T22:52:48.170`) +* [CVE-2023-5080](CVE-2023/CVE-2023-50xx/CVE-2023-5080.json) (`2024-01-19T22:52:48.170`) +* [CVE-2023-5081](CVE-2023/CVE-2023-50xx/CVE-2023-5081.json) (`2024-01-19T22:52:48.170`) +* [CVE-2023-6043](CVE-2023/CVE-2023-60xx/CVE-2023-6043.json) (`2024-01-19T22:52:48.170`) +* [CVE-2023-6044](CVE-2023/CVE-2023-60xx/CVE-2023-6044.json) (`2024-01-19T22:52:48.170`) +* [CVE-2023-6450](CVE-2023/CVE-2023-64xx/CVE-2023-6450.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-21597](CVE-2024/CVE-2024-215xx/CVE-2024-21597.json) (`2024-01-19T21:04:30.330`) +* [CVE-2024-0553](CVE-2024/CVE-2024-05xx/CVE-2024-0553.json) (`2024-01-19T21:15:08.527`) +* [CVE-2024-0567](CVE-2024/CVE-2024-05xx/CVE-2024-0567.json) (`2024-01-19T21:15:08.613`) +* [CVE-2024-0728](CVE-2024/CVE-2024-07xx/CVE-2024-0728.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-0729](CVE-2024/CVE-2024-07xx/CVE-2024-0729.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-0730](CVE-2024/CVE-2024-07xx/CVE-2024-0730.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-0731](CVE-2024/CVE-2024-07xx/CVE-2024-0731.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-0732](CVE-2024/CVE-2024-07xx/CVE-2024-0732.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-22211](CVE-2024/CVE-2024-222xx/CVE-2024-22211.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-23329](CVE-2024/CVE-2024-233xx/CVE-2024-23329.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-23331](CVE-2024/CVE-2024-233xx/CVE-2024-23331.json) (`2024-01-19T22:52:48.170`) +* [CVE-2024-21643](CVE-2024/CVE-2024-216xx/CVE-2024-21643.json) (`2024-01-19T22:53:31.730`) +* [CVE-2024-21602](CVE-2024/CVE-2024-216xx/CVE-2024-21602.json) (`2024-01-19T22:55:48.297`) +* [CVE-2024-21603](CVE-2024/CVE-2024-216xx/CVE-2024-21603.json) (`2024-01-19T22:56:11.320`) +* [CVE-2024-21604](CVE-2024/CVE-2024-216xx/CVE-2024-21604.json) (`2024-01-19T22:56:35.733`) +* [CVE-2024-21601](CVE-2024/CVE-2024-216xx/CVE-2024-21601.json) (`2024-01-19T22:57:04.600`) +* [CVE-2024-21600](CVE-2024/CVE-2024-216xx/CVE-2024-21600.json) (`2024-01-19T22:57:21.587`) +* [CVE-2024-21596](CVE-2024/CVE-2024-215xx/CVE-2024-21596.json) (`2024-01-19T22:58:28.350`) ## Download and Usage